An issue was discovered on WatchGuard AP100, AP102, and AP200 devices with firmware before 1.2.9.15. Hardcoded credentials exist for an unprivileged SSH account with a shell of /bin/false.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2018/May/12 | Mailing List Third Party Advisory |
https://watchguardsupport.secure.force.com/publicKB?type=KBSecurityIssues&SFDCID=kA62A0000000LIy | Vendor Advisory |
https://www.exploit-db.com/exploits/45409/ | |
https://www.watchguard.com/wgrd-blog/new-firmware-available-ap100ap102ap200ap300-security-vulnerability-fixes | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
History
No history.
Information
Published : 2018-04-30 22:29
Updated : 2024-02-04 19:46
NVD link : CVE-2018-10575
Mitre link : CVE-2018-10575
CVE.ORG link : CVE-2018-10575
JSON object : View
Products Affected
watchguard
- ap200
- ap102
- ap100
- ap200_firmware
- ap100_firmware
- ap102_firmware
CWE
CWE-798
Use of Hard-coded Credentials